Formal Approach for Route Agility against Persistent Attackers

نویسندگان

  • Jafar Haadi Jafarian
  • Ehab Al-Shaer
  • Qi Duan
چکیده

To proactively defend against denial of service attacks, we propose an agile multipath routing approach called random route mutation (RRM) which combines game theory and constraint satisfaction optimization to determine the optimal strategy for attack deterrence while satisfying security, performance and QoS requirements of the network. Our contribution in this paper is fourfold: (1) we model the interaction between RRM defender and DoS attacker as a game in order to determine the parameters by which the defender can maximize her benefit, (2) we model route selection as a constraint satisfaction optimization and formalize it using Satisfiability Modulo Theories (SMT) to identify efficient practical routes, (3) we provide algorithms for sound and smooth deployment of RRM on conventional as well as software-defined networks, and (4) we develop analytical and experimental models to investigate the effectiveness and limitation of RRM under different network and adversarial parameters. Our analysis and preliminary implementation show that RRM can protect up to 90% of flow packets from being attacked against persistent attackers, as compared with single-path routing schemes. Moreover, our implementation shows that RRM can be efficiently deployed on networks without causing any disruption for flows.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reliability and factorial validity of agility tests for soccer players.

The purpose of this study was to evaluate the reliability and factorial validity of agility tests used in soccer. One hundred fifty (n = 150), elite, male, junior soccer players, members of the First Junior League Team, volunteered to participate in the study. The slalom test (ST) sprint 4 x 5 m (S4 x 5) and sprint 9-3-6-3-6-9 m with 180 degree turns (S180 degrees) tests had a greater reliabili...

متن کامل

Security and Predictability: Two Missing Pieces in BGP

Lack of Security: BGP’s resilience against attack is essential for the security of the Internet. BGP currently enables peers to transmit route announcements over authenticated channels, so that adversaries cannot impersonate the legitimate sender of a route announcement. This approach, which verifies who is speaking but not what they say, leaves the current infrastructure extremely vulnerable t...

متن کامل

Designing for Agility as an Organizational Capability: Learning from a Software Development Firm

The purpose of this paper is to investigate the nature of agility in an organizational setting -how a software development firm (SDF) developed, maintained and enhanced agility as it changed from a developer of experimental prototypes to a product-based provider. Qualitative approach based on extensive interviews and on-site observations at two points in time separated by a five-year interval. ...

متن کامل

Evaluation of a low-rate DoS attack against application servers

In the network security field there is a need to identify new movements and trends that attackers might adopt, in order to anticipate their attempts with defense and mitigation techniques. The present study explores new approaches that attackers could use in order to make denial of service attacks against application servers. We show that it is possible to launch such attacks by using low-rate ...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013